Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2021

Total of 337 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 176-200 ... 326-337
Showing up to 25 entries per page: fewer | more | all
[101] arXiv:2112.06872 [pdf, other]
Title: Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors
Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near
Comments: 16 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102] arXiv:2112.07061 [pdf, other]
Title: Differentially Private Data Publication with Multi-level Data Utility
Honglu Jiang, S M Sarwar, Haotian Yu, Sheikh Ariful Islam
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:2112.07130 [pdf, other]
Title: A code-based hybrid signcryption scheme
Jean Belo Klamti, M. Anwar Hasan
Comments: We made some improvment in the paper
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Number Theory (math.NT)
[104] arXiv:2112.07143 [pdf, other]
Title: Better Pay Attention Whilst Fuzzing
Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Liyi Zhang, Peng Cheng
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[105] arXiv:2112.07178 [pdf, other]
Title: MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction
Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu
Comments: Will be published in Proc. Design, Automation and Test in Europe (DATE) 2022
Subjects: Cryptography and Security (cs.CR)
[106] arXiv:2112.07213 [pdf, other]
Title: In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[107] arXiv:2112.07339 [pdf, other]
Title: Speeding up enclave transitions for IO-intensive applications
Jakob Svenningsson, Nicolae Paladi, Arash Vahidi
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[108] arXiv:2112.07397 [pdf, other]
Title: Randomized Response Mechanisms for Differential Privacy Data Analysis: Bounds and Applications
Fei Ma, Ping Wang
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:2112.07411 [pdf, other]
Title: INRU: A Quasigroup Based Lightweight Block Cipher
Sharwan K. Tiwari, Ambrish Awasthi, Sucheta Chkrabarti, Sudha Yadav
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[110] arXiv:2112.07498 [pdf, other]
Title: Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
Daniele Lain, Kari Kostiainen, Srdjan Capkun
Comments: To appear in IEEE S&P 2022
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[111] arXiv:2112.07623 [pdf, other]
Title: D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network
Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe
Comments: Revised version based on anonymous reviewers' comments. Journal extension of this https URL
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:2112.07647 [pdf, other]
Title: A study on the Morris Worm
Akshay Jajoo
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2112.07798 [pdf, other]
Title: Public key cryptography based on twisted dihedral group algebras
Javier de la Cruz, Ricardo Villanueva-Polanco
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[114] arXiv:2112.07826 [pdf, other]
Title: Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Huashan Chen, Hasan Cam, Shouhuai Xu
Subjects: Cryptography and Security (cs.CR)
[115] arXiv:2112.07850 [pdf, other]
Title: HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing
Xiao Han, Yuncong Yang, Junjie Wu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116] arXiv:2112.07873 [pdf, other]
Title: Tracing Text Provenance via Context-Aware Lexical Substitution
Xi Yang, Jie Zhang, Kejiang Chen, Weiming Zhang, Zehua Ma, Feng Wang, Nenghai Yu
Comments: Accepted by AAAI-2022
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[117] arXiv:2112.08162 [pdf, other]
Title: EXT-TAURUM P2T: an Extended Secure CAN-FD Architecture for Road Vehicles
Franco Oberti, Alessandro Savino, Ernesto Sanchez, Filippo Parisi, Stefano Di Carlo
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2112.08331 [pdf, other]
Title: Model Stealing Attacks Against Inductive Graph Neural Networks
Yun Shen, Xinlei He, Yufei Han, Yang Zhang
Comments: To Appear in the 43rd IEEE Symposium on Security and Privacy, May 22-26, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119] arXiv:2112.08371 [pdf, other]
Title: Blockchain as an IoT intermediary
M. Sipek, M. Zagar, B. Mihaljevic
Comments: 8 pages, 3 figures
Journal-ref: International Conference on Interactive Mobile Communication Technologies and Learning (IMCL), 2021, pp. 1283-1288
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[120] arXiv:2112.08431 [pdf, other]
Title: Cybersecurity Revisited: Honeytokens meet Google Authenticator
Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke
Comments: 6 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2112.08473 [pdf, other]
Title: IoT Security and Safety Testing Toolkits for Water Distribution Systems
Sean O'Toole, Cameron Sewell, Hoda Mehrpouyan
Comments: 8 pages, 13 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[122] arXiv:2112.08487 [pdf, html, other]
Title: Differential Privacy in Aggregated Mobility Networks: Balancing Privacy and Utility
Ammar Haydari, Chen-Nee Chuah, Michael Zhang, Jane Macfarlane, Sean Peisert
Comments: 12 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2112.08520 [pdf, other]
Title: FirmwareDroid: Security Analysis of the Android Firmware EcoSystem
Thomas Sutter
Comments: 124 pages, Master thesis, Zurich University of Applied Sciences
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2112.08590 [pdf, other]
Title: Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support
Asad Ali, Samin Rahman Khan, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin
Comments: 14 pages. 8 figures. Submitted to IEEE Access
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[125] arXiv:2112.08658 [pdf, other]
Title: Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics
Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi
Journal-ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp 2046--2065
Subjects: Cryptography and Security (cs.CR)
Total of 337 entries : 1-25 26-50 51-75 76-100 101-125 126-150 151-175 176-200 ... 326-337
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack